Editor's Note

Give a Paradigm Shift

SOME years ago, while working for the Air Force, a cool new word appeared. At least it was new to me. Paradigm. Back in the late 1980s, the Air Force began a paradigm shift to improve the way it conducted business. Instead of settling for average productivity, average business partners and average products, the Air Force would improve the quality of business all around.

The security industry, or at least the technology sector of the industry, has designated a new word to announce what's new and what's happening in the industry -- and it's convergence. Until the middle of August, convergence was the buzzword, but things have changed since then.

The Air Force is in the business of protecting our homeland and securing our freedom. Nonetheless, a paradigm shift was underway to employ a quality product by quality employees.

The security industry, or at least the technology sector of the industry, has designated a new word to announce what's new and what's happening in the industry -- and it's convergence. Until the middle of August, convergence was the buzzword, but things have changed since then.

Convergence is out, and interoperability is in.

That's right ... interoperability is the new paradigm shift.

While attending the 2006 Convergence & Campus Security Forum, sponsored by ADT, I learned plenty about technology and convergence, and if I use the word convergence too many times, feel free to substitute interoperability at will.

While conversing with the media, ADT's vice president of worldwide marketing Jamie Haenggi pointed out there is a two-pronged convergence phenomenon. Within product evolution, physical security devices become IP-enabled and ride on corporate networks, and the connectivity opens up significant new application opportunities, including business operations. She also said the theme of the convergence of physical and logical security blends common solution elements that emerge across physical security and MIS applications.

Within the customer dynamics of IT-enabled physical security, IT becomes an influencer, driver or co-owner. She said traditional security owners must engage with IT, which is often counter cultural. As you can image, there is a bit of tension between IT, physical security and preferred suppliers. The convergence of physical and logical security means the CIO becomes the solution architect, IT integrators' value proposition becomes more compelling, and the potential of a chief security officer owning all of the security now becomes a viable option.

The implications of convergence will require industry standards and regulations to adopt to rapid technology changes, and according to Haenggi, the implications of convergence trends also will redefine the traditional security space.

Because of convergence, or interoperability, there will be new decision makers and a commoditization of products. Security will improve its position in the value chain and will become more defined.

Haenggi said the convergence issue will leverage IT infrastructure for efficiency, mass storage and bandwidth, and it will allow customers to think more globally. Not that the economy isn't a global platform now, but new decision makers and influencers will take security into other areas such as merchandising, business operations and compliance.

See what I mean? We're standing at the security line of scrimmage and an audible is coming. Things are about to change. The changes will happen so quickly it may appear as though they've always been part of the infrastructure.

According to ADT's new COO John Koch, the traditional security market is undergoing significant changes which carry important implications for its North American operations. He said that his clients, the decision makers of their respected corporations, are shifting to CIOs and business leaders. Koch also said the technology evolution means a dual convergence of physical security and IT. This means that security devices are becoming IP-enabled, as well as the integration of physical and logical security.

All this means that technology advancements are creating new business opportunities in the data world and in business analytics. Traditional security products and services are being substituted by new technologies, and several vertical-specific technologies and applications are emerging.

The landscape also is changing in the competitive world of security. IT product companies, such as Cisco Systems, are entering the physical security marketplace. The industry also is watching system integrators move into security such as Accenture, IBM and TechData. There also will be many security product manufacturers making integrated products, such as GE Security, and there will be security players building IT and vertical-specific capabilities such as Red Hawk and Stanley Security. Red Hawk, however, has been acquired, or to be more specific at the time of this writing, is part of an acquisition agreement with United Technologies. This type of strategic acquisition melds electronics solutions such as video surveillance to physical equipment, such as safes, vaults and ATMs. UTC enhances its holdings as a fire safety and security solutions provider as a diversified company providing high technology products and services to the building and aerospace industry.

Koch, who is relatively new at ADT, comes to the multi-billion dollar company from the telephony world, expecting an era of convergence that continues with growth on both the top and bottom line. He said it's not likely that ADT will jump into the manufacturing industry, but I wouldn't bet against it. He does plan to grow the authorized dealer program, and part of his five-year interoperability plan is to seek convergence growth quickly, remain a leading provider of security services and see that the company drives the technology vehicle.

ADT will call an audible, but not one that is unexpected. Global growth, which every company in the world is seeking, is at the center of Koch's plans. He is quick to point out that China is at an epicenter of growth in the monitoring business, though he expects growth in the Middle East, Africa and Europe.

The paradigm shift is pretty clear at ADT. Plans for interoperability call for a continued, but more focused, worldwide development. The company's business model of having call centers that cover for one another, if needed, may be the perfect operating platform in a global marketplace -- I hope the employees in Denver can speak Mandarin.

This article originally appeared in the October 2006 issue of Security Products, pg. 6.

Featured

  • New Research Reveals Global Video Surveillance Industry Perspectives on AI

    Axis Communications, the global industry leader in video surveillance, has released its latest research report, ‘The State of AI in Video Surveillance,’ which explores global industry perspectives on the use of AI in the security industry and beyond. The report reveals current attitudes on AI technologies thanks to in-depth interviews with AI experts from Axis’ global network and a comprehensive survey of more than 5,800 respondents, including distributors, channel partners, and end customers across 68 countries. The resulting insights cover AI integration and the opportunities and challenges that exist with regard to security, safety, business intelligence, and operational efficiency. Read Now

  • SIA Urges Tariff Relief for Security Industry Products

    Today, the Security Industry Association has sent a letter to U.S. Trade Representative Jamieson Greer and U.S. Secretary of Commerce Howard Lutnick requesting relief from tariffs for security industry products and asking that the Trump administration formulate a process that allows companies to apply for product-specific exemptions. The security industry is an important segment of the U.S. economy, contributing over $430 billion in total economic impact and supporting over 2.1 million jobs. Read Now

  • Report Shows Cybercriminals Continue Pivot to Stealthier Tactics

    IBM recently released the 2025 X-Force Threat Intelligence Index highlighting that cybercriminals continued to pivot to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined. IBM X-Force observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied heavily on to scale identity attacks. Read Now

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.